Security News > 2019 > June > SandboxEscaper Debuts ByeBear Windows Patch Bypass

2019-06-07 15:27
SandboxEscaper is back, with a second bypass for the recent CVE-2019-0841 Windows patch.
News URL
https://threatpost.com/sandboxescaper-byebear-windows-bypass/145470/
Related news
- New Windows zero-day leaks NTLM hashes, gets unofficial patch (source)
- Broadcom warns of authentication bypass in VMware Windows Tools (source)
- Update VMware Tools for Windows Now: High-Severity Flaw Lets Hackers Bypass Authentication (source)
- New Windows 11 trick lets you bypass Microsoft Account requirement (source)
- Windows 11 Forces Microsoft Account Sign In & Removes Bypass Trick Option (source)
- April's Patch Tuesday leaves unlucky Windows Hello users unable to login (source)
- Week in review: Microsoft patches exploited Windows CLFS 0-day, WinRAR MotW bypass flaw fixed (source)
- New Windows Task Scheduler Bugs Let Attackers Bypass UAC and Tamper with Logs (source)
- Microsoft pitches pay-to-patch reboot reduction subscription for Windows Server 2025 (source)
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2019-04-09 | CVE-2019-0841 | Link Following vulnerability in Microsoft products An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka 'Windows Elevation of Privilege Vulnerability'. | 7.8 |